532 BNS6 PT8

532 BNS6 PT8

University

50 Qs

quiz-placeholder

Similar activities

FAST Math Practice 3rd BPES Maddox

FAST Math Practice 3rd BPES Maddox

3rd Grade - University

50 Qs

3rd Quarter Reviewer

3rd Quarter Reviewer

9th Grade - University

50 Qs

Final Exam Review 3

Final Exam Review 3

9th Grade - University

47 Qs

MATH MAJOR 229- MATHEMATICS OF INVESTMENT

MATH MAJOR 229- MATHEMATICS OF INVESTMENT

University

50 Qs

Chapter 1 Stat Practice

Chapter 1 Stat Practice

University

55 Qs

03 Collecting Data Unit Review

03 Collecting Data Unit Review

11th Grade - University

50 Qs

Term Structure of Interest Rate

Term Structure of Interest Rate

University

53 Qs

Credit Pre-Test

Credit Pre-Test

University

50 Qs

532 BNS6 PT8

532 BNS6 PT8

Assessment

Quiz

Mathematics

University

Hard

Created by

jaret valdez

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.358 Which of the following must be in place before implementing a BCP?

(A). SLA

(B). AUP

(C). NDA

(D). BIA

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.359 A500 is implementing an insider threat detection program, The primary concern is that

users may be accessing confidential data without authorization. Which of the fallowing should be

deployed to detect a potential insider threat?

(A). A honeyfile

(B). A DMZ

(C). ULF

(D). File integrity monitoring

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.360 A startup company is using multiple SaaS and IaaS platforms to stand up a corporate

infrastructure and build out a customer-facing web application. Which of the following solutions

would be BEST to provide security, manageability, and visibility into the platforms?

(A). SIEM

(B). DLP

(C). CASB

(D). SWG

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.361 A security analyst is investigating multiple hosts that are communicating to external IP

addresses during the hours of 2:00 a.m - 4:00 am. The malware has evaded detection by traditional

antivirus software. Which of the following types of malware is MOST likely infecting the hosts?

(A). A RAT

(B). Ransomware

(C). Logic bomb

(D). A worm

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.362 A public relations team will be taking a group of guest on a tour through the facility of a

large e-commerce company. The day before the tour, the company sends out an email to employees

to ensure all whiteboars are cleaned and all desks are cleared. The company is MOST likely trying to

protect against.

(A). Loss of proprietary information

(B). Damage to the company's reputation

(C). Social engineering

(D). Credential exposure

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.363 A desktop support technician recently installed a new document-scanning software program

on a computer However, when the end user tried to launch the program, it did not respond. Which of

the following is MOST likely the cause?

(A). A new firewall rule is needed to access the application.

(B). The system was quarantined for missing software updates

(C). The software was not added to the application whitelist.

(D). The system was isolated from the network due to infected software.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.364 Users reported several suspicious activities within the last two weeks that resulted in

several unauthorized transactions. Upon investigation, the security analyst found the following:

* Multiple reports of breached credentials within that time period

* Traffic being redirected in certain parts of the network

* Fraudulent emails being sent by various internal users without their consent Which of the following

types of attacks was MOST likely used?

(A). Replay attack

(B). Race condition

(C). Cross site scripting

(D). Request forgeries

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Mathematics